Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computational security
biblio
The Computational and Symbolic Security Analysis Connections
Submitted by grigby1 on Fri, 02/17/2023 - 4:21pm
pubcrawl
Metrics
resilience
Resiliency
Protocols
Computational modeling
automata
Compositionality
Numerical models
scientific computing
Data integration
cloud storage
computational security
Light rail systems
Symbolic Security Analysis
Scientific Computing Security
biblio
An Interactive Prover for Protocol Verification in the Computational Model
Submitted by grigby1 on Thu, 02/24/2022 - 11:29am
policy-based collaboration
tools
Solids
Semantics
security protocols
pubcrawl
protocol verification
Protocols
privacy
cognition
observational equivalence
Interactive Prover
formal methods
computational security
Computational modeling
Compositionality
composability
collaboration
biblio
On measures of information theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 3:40pm
information theory
Shannon perfect secrecy
information theoretic cryptosystem
ideal secrecy
information theoretic security
Vectors
Australia
probability
computational security
Scalability
Entropy
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Using Intel SGX to Protect Authentication Credentials in an Untrusted Operating System
Submitted by aekwall on Mon, 03/18/2019 - 8:49am
Software Guard Extensions
PAM authentication framework
password
password file protection scheme
private memory regions
privileged code
sensitive applications
SGX enclave
Software Architecture
OS kernel
TCB
trusted computing base
UniSGX
Unix
Unix systems
untrusted operating system
BIOS Security
Human behavior
Scalability
authorisation
encryption
telecommunication security
Hardware
Program processors
Trusted Computing
Resiliency
security of data
pubcrawl
Metrics
authentication
Intel SGX
authentication credentials
BIOS
computational security
biblio
Security modalities on linear network code for randomized sources
Submitted by grigby1 on Mon, 06/11/2018 - 2:34pm
randomized sources
network coding
number random symbols
optimally secure information transmission
Peer-to-peer computing
pubcrawl
r-secure
random keys
random source symbols
randomized source messages
Metrics
resilience
Resiliency
Secure network code
security
security constraints
security modalities
telecommunication security
weakly secure
wiretapped network
information symbols
composability
computational security
Conferences
cryptographic measure
Cryptography
encoding
illegitimate users
imperfectly secure
information rate
adversaries
information theoretic approach
information theoretic security bounds
Knowledge engineering
linear codes
linear network code
linear network coding scheme
Mathematical model
maximized information transmission